A MANET is an autonomous group of mobile users that communicate over reasonably slow
wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes
are mobile. The network is decentralized, where all network activity, including discovering the topology
and delivering messages must be executed by the nodes themselves. Hence routing functionality will
have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a
self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union
of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be
connected to the larger Internet Problems in Ad Hoc Networks.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Centralized System in MANET with GRP Protocolijceronline
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes.. In this paper routing protocols GRP for mobile ad hoc network with centralized system is checked to know the performance of the network. We will see that, is their any change in the performance of the network if will deploy centralized system in MANET.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Centralized System in MANET with GRP Protocolijceronline
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes.. In this paper routing protocols GRP for mobile ad hoc network with centralized system is checked to know the performance of the network. We will see that, is their any change in the performance of the network if will deploy centralized system in MANET.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security of conversation between mobile nodes. The security experience from the Wired Network world is of little use in Wireless Mobile Ad hoc networks, due to some basic di_erences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanisms.
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
ABSTRACT: In general, Wireless communication is defined as sharing of information between one or more systems
through wireless links. Wireless networks can be categorized into two different modes as infrastructure based and
infrastructure less. Infrastructure based mode is the most common use wireless mode for the end user loop. Infrastructure
fewer modes also called as the Ad hoc mode relies on wireless communications without any fixed infrastructure.
Infrastructure based networks are characterized by their use of access points (AP), or base stations. The most known
example of infrastructure based wireless network is GSM and more recently, Wi-Fi. Ad Hoc networks introduce a new way
of communication. An ad hoc network is a collection of wireless mobile nodes that dynamically functions as a network
without the use of any existing infrastructure and centralized administration. Mobile Ad-hoc networking (MANET), an
emerging field of wireless networking is an autonomous system of wireless mobile hosts, connected by wireless links that
dynamically create a temporary network and establish an infrastructure less network. The topology of the network may
change frequently and unpredictably. Multicast routing has been widely applied in mobile ad hoc networks (MANETs), to
support different group oriented applications like video conferencing, interactions with Special interest groups etc.,
efficiently. This paper presents the comparative analysis of two multicast routing protocols, PUMA and ODMRP.
Keywords: MANET, PUMA, ODMRP, AODV, WMN’s.
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm) and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security of conversation between mobile nodes. The security experience from the Wired Network world is of little use in Wireless Mobile Ad hoc networks, due to some basic di_erences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanisms.
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
ABSTRACT: In general, Wireless communication is defined as sharing of information between one or more systems
through wireless links. Wireless networks can be categorized into two different modes as infrastructure based and
infrastructure less. Infrastructure based mode is the most common use wireless mode for the end user loop. Infrastructure
fewer modes also called as the Ad hoc mode relies on wireless communications without any fixed infrastructure.
Infrastructure based networks are characterized by their use of access points (AP), or base stations. The most known
example of infrastructure based wireless network is GSM and more recently, Wi-Fi. Ad Hoc networks introduce a new way
of communication. An ad hoc network is a collection of wireless mobile nodes that dynamically functions as a network
without the use of any existing infrastructure and centralized administration. Mobile Ad-hoc networking (MANET), an
emerging field of wireless networking is an autonomous system of wireless mobile hosts, connected by wireless links that
dynamically create a temporary network and establish an infrastructure less network. The topology of the network may
change frequently and unpredictably. Multicast routing has been widely applied in mobile ad hoc networks (MANETs), to
support different group oriented applications like video conferencing, interactions with Special interest groups etc.,
efficiently. This paper presents the comparative analysis of two multicast routing protocols, PUMA and ODMRP.
Keywords: MANET, PUMA, ODMRP, AODV, WMN’s.
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
Abstract A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols. Keywords: MANET, AODV, Network Simulator, DSR
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
Survey of Reactive Routing Protocols for MANETIOSR Journals
Abstract : A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is needed. The performance differentials are analyzed using varying performance metrics. These simulations are carried out using the ns-2 network simulator. Keywords – AODV, DSR, MANET, NS-2, Reactive routing protocols, Survey.
Survey of Reactive Routing Protocols for MANETIOSR Journals
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator
Introduction, Applications & Challenges of a MANET, Routing, Classification of Routing Algorithms, Algorithms such as DSR, AODV, DSDV, etc., Mobile Agents, Service Discovery.
Protocols and Platforms for Mobile Computing: WAP, Bluetooth, XML, J2ME, Java Card, Palm OS, Windows CE, Symbian OS, Linux for Mobile Devices, Android.
Mobile Ad HOC networks (MANET’S) are networks in which all nodes are mobile and
communicate with each other via wireless connections. Nodes can join or leave the network at any
time. There is no fixed infrastructure. Research and industries are recently more interesting and
attracting to the VANET and MANET development domain. A vehicular ad hoc network (VANET)
is a subclass of MANET. In this paper, we propose Bee Routing Protocol for Ad Hoc Network, in
which a new quality of service multipath routing protocol adapted for the VANET. This algorithm is
a reactive source routing algorithm and consumes less energy as compared to DSDV, AODV, DSR
routing algorithms because a fewer control packets for routing are sent as compared to other
networks.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints
of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated
using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be
evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints
of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated
using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be
evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
These days we have an increased number of heart diseases including increased risk of heart attacks. Our proposed system users sensors that allow to detect heart rate of a person using heartbeat sensing even if the person is at home. The sensor is then interfaced to a microcontroller that allows checking heart rate readings and transmitting them over internet. The user may set the high as well as low levels of heart beat limit. After setting these limits, the system starts monitoring and as soon as patient heart beat goes above a certain limit, the system sends an alert to the controller which then transmits this over the internet and alerts the doctors as well as concerned users. Also the system alerts for lower heartbeats. Whenever the user logs on for monitoring, the system also displays the live heart rate of the patient. Thus concerned ones may monitor heart rate as well get an alert of heart attack to the patient immediately from anywhere and the person can be saved on time.This value will continue to grow if no proper solution is found. Internet of Things (IoT) technology developments allows humans to control a variety of high-tech equipment in our daily lives. One of these is the ease of checking health using gadgets, either a phone, tablet or laptop. we mainly focused on the safety measures for both driver and vehicle by using three types of sensors: Heartbeat sensor, Traffic light sensor and Level sensor. Heartbeat sensor is used to monitor heartbeat rate of the driver constantly and prevents from the accidents by controlling through IOT.
ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS
Cloud computing is the one of the emerging techniques to process the big data. Large collection of set or large
volume of data is known as big data. Processing of big data (MRI images and DICOM images) normally takes
more time compare with other data. The main tasks such as handling big data can be solved by using the concepts
of hadoop. Enhancing the hadoop concept it will help the user to process the large set of images or data. The
Advanced Hadoop Distributed File System (AHDF) and MapReduce are the two default main functions which
are used to enhance hadoop. HDF method is a hadoop file storing system, which is used for storing and retrieving
the data. MapReduce is the combinations of two functions namely maps and reduce. Map is the process of
splitting the inputs and reduce is the process of integrating the output of map’s input. Recently, in medical fields
the experienced problems like machine failure and fault tolerance while processing the result for the scanned
data. A unique optimized time scheduling algorithm, called Advanced Dynamic Handover Reduce Function
(ADHRF) algorithm is introduced in the reduce function. Enhancement of hadoop and cloud introduction of
ADHRF helps to overcome the processing risks, to get optimized result with less waiting time and reduction in
error percentage of the output image
Text mining has turned out to be one of the in vogue handle that has been joined in a few research
fields, for example, computational etymology, Information Retrieval (IR) and data mining. Natural
Language Processing (NLP) methods were utilized to extricate learning from the textual text that is
composed by people. Text mining peruses an unstructured form of data to give important
information designs in a most brief day and age. Long range interpersonal communication locales
are an awesome wellspring of correspondence as the vast majority of the general population in this
day and age utilize these destinations in their everyday lives to keep associated with each other. It
turns into a typical practice to not compose a sentence with remedy punctuation and spelling. This
training may prompt various types of ambiguities like lexical, syntactic, and semantic and because of
this kind of indistinct data; it is elusive out the genuine data arrange. As needs be, we are directing
an examination with the point of searching for various text mining techniques to get different
textual requests via web-based networking media sites. This review expects to depict how
contemplates in online networking have utilized text investigation and text mining methods to
identify the key topics in the data. This study concentrated on examining the text mining
contemplates identified with Facebook and Twitter; the two prevailing web-based social networking
on the planet. Aftereffects of this overview can fill in as the baselines for future text mining research.
Colorectal cancer (CRC) has potential to spread within the peritoneal cavity, and this transcoelomic
dissemination is termed “peritoneal metastases” (PM).The aim of this article was to summarise the current
evidence regarding CRC patients at high risk of PM. Colorectal cancer is the second most common cause of cancer
death in the UK. Prompt investigation of suspicious symptoms is important, but there is increasing evidence that
screening for the disease can produce significant reductions in mortality.High quality surgery is of paramount
importance in achieving good outcomes, particularly in rectal cancer, but adjuvant radiotherapy and chemotherapy
have important parts to play. The treatment of advanced disease is still essentially palliative, although surgery for
limited hepatic metastases may be curative in a small proportion of patients.
Heat transfer in pipes is a distinctive kind of procedure employed in heat exchanger which transfers great
deal of heat because of the impact of capillary action and phase change heat transfer principle. Late improvement
in the heat pipe incorporates high thermal conductivity liquids like Nano liquids, fixed inside to extricate the most
extreme heat. This paper audits, impact of different factors, for example, thermal pipe tilt edge, charged measure
of working liquid, nano particles sort, size, and mass/volume part and its impact on the change of thermal
proficiency, thermal exchange limit and decrease in thermal protection. The Nano liquid arrangement and the
examination of its thermal attributes likewise have been investigated. The retained sun oriented vitality is
exchanged to the working liquid streaming in the pipe. The execution of the framework is affected by thermal
exchange from tube to working liquid, with least convective misfortunes, which must be considered as one of the
essential plan factor. In tube and channel streams, to improve the rate of heat exchange to the working liquid,
detached enlargement methods, for example, contorted tapes and swirl generators are employed from the fluid
flow path. The variation of heat transfer coefficient and pressure drop in the pipe flow for water and water based
Al2O3 Nano fluids at different volume concentrations and twisted tapes are studied.
Now-a-day’s pedal powered grinding machine is used only for grinding purpose. Also, it requires lots of efforts
and limited for single application use. Another problem in existing model is that it consumed more time and also has
lower efficiency. Our aim is to design a human powered grinding machine which can also be used for many purposes
like pumping, grinding, washing, cutting, etc. it can carry water to a height 8 meter and produces 4 ampere of electricity
in most effective way. The system is also useful for the health conscious work out purpose. The purpose of this technical
study is to increase the performance and output capacity of pedal powered grinding machine.
This project proposes a distributed control approach to coordinate multiple energy storage units
(ESUs) to avoid violation of voltage and network load constraints ESU as a buffer can be a promising
solution which can store surplus power during the peak generation periods and use it in peak load
periods.In ESU converters both active and reactive power are used to deal with the power quality
issues in distribution network ESU’s reactive power is proposed to be used for voltage support, while
the active power is to be utilized in managing network loading.
The steady increase in non-linear loads on the power supply network such as, AC variable speed drives,
DC variable Speed drives, UPS, Inverter and SMPS raises issues about power quality and reliability. In this
subject, attention has been focused on harmonics . Harmonics overload the power system network and cause
reliability problems on equipment and system and also waste energy. Passive and active harmonic filters are
used to mitigate harmonic problems. The use of both active and passive filter is justified to mitigate the
harmonics. The difficulty for practicing engineers is to select and deploy correct harmonic filters , This paper
explains which solutions are suitable when it comes to choosing active and passive harmonic filters and also
explains the mistakes need to be avoided.
This Paper is aimed at analyzing the few important Power System equipment failures generally
occurring in the Industrial Power Distribution system. Many such general problems if not resolved it may
lead to huge production stoppage and unforeseen equipment damages. We can improve the reliability of
Power system by simply applying the problem solving tool for every case study and finding out the root cause
of the problem, validation of root cause and elimination by corrective measures. This problem solving
approach to be practiced by every day to improve the power system reliability. This paper will throw the light
and will be a guide for the Practicing Electrical Engineers to find out the solution for every problem which
they come across in their day to day maintenance activity.
More from IJET - International Journal of Engineering and Techniques (20)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Final project report on grocery store management system..pdf
[IJET-V1I6P19] Authors : Kirti
1. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 93
A Review on Mobile AD HOC Networks
Kirti (M.Tech N.S.)
Sonal Beniwal (Assistant Professor in CSE/IT Dept.)
School of Engineering & Sciences
B.P.S.M.V (Khanpur Kalan, Sonipat)
1. INTRODUCTION
A Mobile ad hoc network is a group of
wireless mobile computers (or nodes). In
which nodes collaborate by forwarding
packets for each other to allow them to
communicate outside range of direct
wireless transmission. Ad hoc networks
require no centralized administration or
fixed network infrastructure such as base
stations or access points, and can be quickly
and inexpensively set up as needed. A
MANET is an autonomous group of mobile
users that communicate over reasonably
slow wireless links. The network topology
may vary rapidly and unpredictably over
time, because the nodes are mobile. The
network is decentralized, where all network
activity, including discovering the topology
and delivering messages must be executed
by the nodes themselves. Hence routing
functionality will have to be incorporated
into the mobile nodes.
2. HISTORY
We can classified the mobile ad hoc
network into first, second and third
generation. Present work on the third
generation ad hoc network.The first
generation of ad hoc network , these are
called Packet Radio Network (PRNET) can
be traced back to 1970’s. In 1970’s. The
Defence Advanced Research Project
Agency (DARPA) initiated research of
using packet- switched radio technology
that provide reliable communication
between computers and urbanized PRNET.
Basically PRNET uses the combination of
two most popular technology Areal
Location of Hazardous Atmospheres
(ALOHA) and Carrier Sense Multiple
Access (CSMA) for multiple access and
distance vector routing. The PRNET is then
evolved into the Survivable Adaptive Radio
Network (SURAN) that provides some
benefits by improving the radio performance
through making them smaller, cheaper and
power thrifty. United State Department of
Defence (DOD) continued work for
programs of improve the performance such
as technologies Globe Mobile Information
System (GloMo) and Near Term Digital
Radio (NTDR). GloMo allow use of
CSMA/CA and TDMA and provides self-
organizing and self-healing network for
instance ATM over wireless, Satellite
Communication Network. The NTDR make
and allow use of clustering and link state
RESEARCH ARTICLE OPEN ACCESS
Abstract:
A MANET is an autonomous group of mobile users that communicate over reasonably slow
wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes
are mobile. The network is decentralized, where all network activity, including discovering the topology
and delivering messages must be executed by the nodes themselves. Hence routing functionality will
have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a
self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union
of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be
connected to the larger Internet Problems in Ad Hoc Networks.
2. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 94
routing that organized an ad hoc network.
NTDR is introduced by US Army. This is
the only one existing ad hoc network in
use.The functioning group of MANET is
born in Internet Engineering Task Force
(IETF) who worked for routing protocols on
MANET and gives rise to the development
of various mobile devices like PDA’s,
palmtops, notebooks, etc.
2. CHARACTERISTICS OF
MANET
Mobile ad hoc network nodes are
furnished with wireless transmitters and
receivers using [7] antennas, which may be
highly directional (point-to-point), Omni
directional (broadcast), probably steer
able, At a given point in time, depending
on positions of nodes, their transmitter and
receiver coverage patterns, communication
power levels and co-channel interference
levels, a wireless connectivity in the form
of a random, multi-hop graph or "ad hoc"
network exists among the nodes. This ad
hoc topology may modify with time as the
nodes move or adjust their transmission
and reception parameters.The
characteristics of these networks are as
follows:
Communication via wireless
means.
Nodes can perform the roles of
both hosts and routers.
Bandwidth-constrained, variable
capacity links.
Limited Physical Security.
Dynamic network topology.
3. ADVANTAGES OF
MANET
The following are the advantages of
MANET:
They provide access to information
and services regardless of
geographic position.
These networks can be set up at any
place and time [10].
a. DISADVANTAGES OF MANET
Some of the disadvantages of MANETs
are as follows:
Limited resources and physical
security.
Intrinsic mutual trust vulnerable to
attacks.
Lack of authorization facilities.
Volatile network topology makes it
hard to detect malicious nodes.
Security protocols for wired
networks cannot work for ad hoc
networks.
b. APPLICATIONS OF MANET
Some of the applications of MANETs
are as follows:
Military or police exercises.
Disaster relief operations.
Mine cite operations.
Urgent Business meetings.
4. PROPERTIES OF MANET
ROUTING PROTOCOLS
The properties that are desirable in
MANET Routing protocols are:
a). Distributed operation:
The protocol should be distributed. It
should not be dependent on a centralized
controlling node. This is the case even for
stationary networks. The dissimilarity is
that the nodes in an ad-hoc network can
enter or leave the network very easily and
because of mobility the network can be
partitioned.
b). Loop free:
To improve the overall performance, the
routing protocol should assurance that the
routes supplied are loop free. This avoids
any misuse of bandwidth or CPU
consumption.
c). Demand based operation:
To minimize the control overhead in the
network and thus not misuse the network
resources the protocol should be reactive.
This means that the protocol should react
only when needed and should not
periodically broadcast control information.
3. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 95
d). Unidirectional link support:
The radio environment can cause the
formation of unidirectional links.
Utilization of these links and not only the
bi-directional links improves the routing
protocol performance.
e). Security:
The radio environment is especially
vulnerable to impersonation attacks so to
ensure the wanted behavior of the routing
protocol we need some sort of security
measures. Authentication and encryption is
the way to go and problem here lies within
distributing the keys among the nodes in
the ad-hoc network.
f). Power conservation:
The nodes in the ad-hoc network can be
laptops and thin clients such as PDA‘s that
are limited in battery power and therefore
uses some standby mode to save the
power. It is therefore very important that
the routing protocol has support for these
sleep modes.
g). Multiple routes:
To reduce the number of reactions to
topological changes and congestion
multiple routes can be used. If one route
becomes invalid, it is possible that another
stored route could still be valid and thus
saving the routing protocol from initiating
another route discovery procedure.
h). Quality of Service Support:
Some sort of Quality of service is
necessary to incorporate into the routing
protocol. This helps to find what these
networks will be used for. It could be for
instance real time traffic support [12].
5. PROBLEMS IN ROUTING ITH
MOBILE AD HOC NETWORKS
c. Asymmetric links: Most of the wired
networks rely on the symmetric links
which are always fixed. But this is not a
case with ad-hoc networks as the nodes are
mobile and constantly changing their
position within network
d. Routing Overhead: In wireless ad hoc
networks, nodes often change their
location within network. So, some stale
routes are generated in the routing table
which leads to unnecessary routing
overhead.
e. Interference: This is the major problem
with mobile ad-hoc networks as links
come and go depending on the
transmission characteristics, one
transmission might interfere with another
one and node might overhear
transmissions of other nodes and can
corrupt the total transmission.
f. Dynamic Topology: Since the topology
is not constant; so the mobile node might
move or medium characteristics might
change. In ad-hoc networks, routing tables
must somehow reflect these changes in
topology and routing algorithms have to be
adapted. For example in a fixed network
routing table updating takes place for
every 30sec. This updating frequency
might be very low for ad-hoc networks
6. ROUTING PROTOCOLS
Classification of routing protocols in mobile ad hoc network can be done in many ways, but
most of these are done depending on routing strategy and network structure.
The routing protocols can be categorized as flat routing, hierarchical routing and geographic
position assisted routing while depending on the network structure.
According to the routing strategy routing protocols can be classified as Table-driven and
source initiated.
4. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 96
Ad-hoc Routing Protocol
Flat Routing Hierarchical Routing Geographic Position
Assisted Routing
Proactive Reactive
HSR CGSR ZRP LANMAR Geo-Cast LAR DREAM GPSR
AODV DSR
FSR FSLS OLSR TBRPF
Routing Protocols
9.1. Flat Routing Protocols
Flat routing protocols are divided mainly
into two classes; the first one is proactive
routing (table driven) protocols and other
is reactive (on-demand) routing protocols.
One thing is general for both protocol
classes is that every node participating in
routing play an equal role. They have
further been classified after their design
principles; proactive routing is mostly
based on LS (link-state) while on-demand
routing is based on DV (distance-vector).
9.1.1. Pro-Active / Table Driven
routing Protocols
Proactive MANET protocols are also
called as table-driven protocols and will
actively determine the layout of the
network. Through a regular exchange of
network topology packets between the
nodes of the network, at every single node
an absolute picture of the Network is
maintained. There is hence minimal delay
in determining the route to be taken.
This is especially important for time-
critical traffic .When the routing
information becomes worthless quickly,
there are many short-lived routes that are
being determined and not used before they
turn invalid. Therefore, another drawback
resulting from the increased mobility is the
amount of traffic overhead generated when
evaluating these unnecessary routes. This
is especially altered when the network size
increases. The portion of the total control
traffic that consists of actual practical data
is further decreased.
Lastly, if the nodes transmit infrequently,
most of the routing information is
considered redundant. The nodes,
however, continue to expend energy by
continually updating these unused entries
in their routing tables as mentioned,
5. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 97
energy conservation is very important in a
MANET system design. Therefore, this
excessive expenditure of energy is not
desired. Thus, proactive MANET
protocols work best in networks that have
low node mobility or where the nodes
transmit data frequently. Examples of
Proactive MANET [4] Protocols include:
Optimized Link State Routing
(OLSR)
Fish-eye State Routing (FSR)
Destination-Sequenced Distance
Vector (DSDV)
Cluster-head Gateway Switch
Routing Protocol (CGSR)
9.1.2. Reactive (On Demand)
protocols
Portable nodes- Notebooks, palmtops or
even mobile phones usually compose
wireless ad-hoc networks. This portability
also brings a significant issue of mobility.
This is a key issue in ad-hoc networks. The
mobility of the nodes causes the topology
of the network to change constantly.
Keeping track of this topology is not an
easy task, and too many resources may be
consumed in signalling.
Reactive routing protocols were intended
for these types of environments.[4] These
are based on the design that there is no
point on trying to have an image of the
entire network topology, since it will be
constantly changing. Instead, whenever a
node needs a route to a given target, it
initiates a route discovery process on the
fly, for discovering out a pathway
.Reactive protocols start to set up routes
on-demand.
The routing protocol will try to establish
such a route, whenever any node wants to
initiate communication with another node
to which it has no route. This kind of
protocols is usually based on flooding the
network with Route Request (RREQ) and
Route reply (RERP) messages .
By the help of Route request message the
route is discovered from source to target
node; and as the target node gets a RREQ
message it send RERP message for the
confirmation that the route has been
established. This kind of protocol is
usually very effective on single-rate
networks. It usually minimizes the number
of hops of the selected path. However, on
multi-rate networks, the number of hops is
not as important as the throughput that can
be obtained on a given path.
The different types of On Demand driven
protocols are:
Ad hoc On Demand Distance
Vector (AODV)
Dynamic Source routing protocol
(DSR)
Temporally ordered routing
algorithm (TORA)
Associability Based routing (ABR)
Signal Stability-Based Adaptive
Routing (SSA)
Location-Aided Routing Protocol
9.2. Hierarchical Routing Protocols
As the size of the wireless network
increases, the flat routing protocols may
produce too much overhead for the
MANET. In this case a hierarchical
solution may be preferable.
• Hierarchical State Routing (HSR)
• Zone Routing Protocol (ZRP)
6. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 98
• Cluster-head Gateway Switch
Routing Protocol (CGSR)
• Landmark Ad Hoc Routing
Protocol (LANMAR)
9.3. Geographical Routing Protocols
There are two approaches to geographic
mobile ad hoc networks:
1. Actual geographic coordinates (as
obtained through GPS – the Global
Positioning System).
2. Reference points in some fixed
coordinate system.
An advantage of geographic routing
protocols is that they prevent network-
wide searches for destinations. If the
recent geographical coordinates are known
then control and data packets can be sent
in the general direction of the destination.
This trim downs control overhead in the
network. A disadvantage is that all nodes
must have access to their geographical
coordinates all the time to make the
geographical routing protocols useful. The
routing updates must be done faster in
compare of the network mobility rate to
consider the location-based routing
effective. This is because locations of
nodes may change quickly in a MANET.
Examples of geographical routing
protocols are:
• Geo-Cast (Geographic Addressing
and Routing)
• DREAM (Distance Routing Effect
Algorithm for Mobility)
• GPSR (Greedy Perimeter Stateless
Routing)
10.DESCRIPTION OF
REACTIVE PROTOCOLS
Reactive protocol is identified as On-
demand protocols because it creates routes
only when these routes are needed.. The
various Reactive Routing Protocols are
discussed below:
10.1. Ad-hoc On Demand
Distance Vector Routing
(AODV)
Ad hoc On-Demand Distance Vector
(AODV) routing is a routing protocol for
mobile ad-hoc networks and other wireless
ad-hoc networks. It is jointly developed in
Nokia Research Centre of University of
California, Santa Barbara and University
of Cincinnati by C. Perkins and S. Das. It
is an on-demand and distance-vector
routing protocol, meaning that a route is
established by AODV from a destination
only on demand. AODV is capable of both
unicast and multicast routing. It keeps
these routes as long as they are desirable
by the sources. Additionally, AODV
creates trees which connect multicast
group members. The trees are composed of
the group members and the nodes needed
to connect the members. The sequence
numbers are used by AODV to ensure the
freshness of routes. It is loop-free, self-
starting, and scales to large numbers of
mobile nodes.
Characteristics of AODV
• Unicast, Broadcast, and Multicast
communication.
• On-demand route establishment with small
delay.
• Multicast trees connecting group members
maintained for lifetime of multicast group.
• Link breakages in active routes efficiently
repaired and All routes are loop-free
through use of sequence numbers.
• Use of Sequence numbers to track
accuracy of information.
• Only keeps track of next hop for a route
instead of the entire route.
7. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 99
• Use of periodic HELLO messages to track
neighbors.
Advantages and Disadvantages
The main advantage of AODV protocol is
that routes are established on demand and
destination sequence numbers are used to
find the latest route to the destination. The
connection setup delay is less. The
HELLO messages supporting the routes
maintenance are range-limited, so they do
not cause unnecessary overhead in the
network.
One of the disadvantages of this protocol
is that intermediate nodes can lead to
inconsistent routes if the source sequence
number is very old and the intermediate
nodes have a higher but not the latest
destination sequence number, thereby
having stale entries. Also multiple Route-
Reply packets in response to a single
Route-Request packet can lead to heavy
control overhead. Another disadvantage of
AODV is that the periodic beaconing leads
to unnecessary bandwidth consumption.
10.2. Dynamic Source Routing
(DSR)
Dynamic Source Routing (DSR) is a
routing protocol for wireless mesh
networks. It is similar to AODV in that it
establishes a route on-demand when a
transmitting mobile node requests one.
However, it uses source routing instead of
relying on the routing table at each
intermediate device. Dynamic source
routing protocol (DSR) is an on-demand,
source routing protocol, whereby all the
routing information is maintained
(continually updated) at mobile nodes.
DSR allows the network to be completely
self-organizing and self-configuring,
without the need for any existing network
infrastructure or administration. The
protocol is composed of the two main
mechanisms of "Route Discovery" and
"Route Maintenance", which work
together to allow nodes to discover and
maintain routes to arbitrary destinations in
the ad hoc network.
An optimum path for a communication
between a source node and target node is
determined by Route Discovery process.
Route Maintenance ensures that the
communication path remains optimum and
loop-free according the change in network
conditions, even if this requires altering
the route during a transmission. Route
Reply would only be generated if the
message has reached the projected
destination node (route record which is
firstly contained in Route Request would
be inserted into the Route Reply).
Advantages and Disadvantages
DSR uses a reactive approach which
eliminates the need to periodically flood
the network with table update messages
which are required in a table-driven
approach. The intermediate nodes also
utilize the route cache information
efficiently to reduce the control overhead.
The disadvantage of DSR is that the route
maintenance mechanism does not locally
repair a broken down link. The connection
setup delay is higher than in table-driven
protocols. Even though the protocol
performs well in static and low-mobility
environments, the performance degrades
rapidly with increasing mobility. Also,
considerable routing overhead is involved
due to the source-routing mechanism
8. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 100
employed in DSR. This routing overhead
is directly proportional to the path length.
11.DESCRIPTION OF PROACTIVE
PROTOCOL
11.1. DSDV Protocol: (Destination
Sequenced Distance Vector (DSDV)
Protocol)
The destination address
– The number of hops required to reach the
destination and
– The new sequence number, originally
stamped by the destination
The transmitted routing tables will also
contain the hardware address, network
address of the mobile host transmitting
them. The routing tables will contain the
sequence number created by the
transmitter and hence the most new
destination sequence number is preferred
as the basis for making forwarding
decisions. This new sequence number is
also updated to all the hosts in the network
which may decide on how to maintain the
routing entry for that originating mobile
host. After receiving the route information,
receiving node increments the metric and
transmits information by broadcasting.
Incrementing metric is done before
transmission because, incoming packet
will have to travel one more hop to reach
its destination.
Time between broadcasting the routing
information packets is the other important
factor to be considered. When the new
information is received by the mobile host
it will be retransmitted soon effecting the
most rapid possible dissemination of
routing information among all the
cooperating mobile hosts. The mobile host
cause broken links as they move from
place to place within the network. The
broken link may be detected by the layer2
protocol, which may be described as
infinity. When the route is broken in a
network, then immediately that metric is
assigned an infinity metric there by
determining that there is no hop and the
sequence number is updated. Sequence
numbers originating from the mobile hosts
are defined to be even number and the
sequence numbers generated to indicate
infinity metrics are odd numbers.
The broadcasting of the information in the
DSDV protocol is of two types namely:
full dump and incremental dump. Full
dump broadcasting will carry all the
routing information while the incremental
dump will carry only information that has
changed since last full dump. Irrespective
of the two types, broadcasting is done in
network protocol data units (NPDU). Full
dump requires multiple NPDU’s while
incremental requires only one NPDU to fit
in all the information.
When an information packet is received
from another node, it compares the
sequence number with the available
sequence number for that entry. If the
sequence number is larger, then it will
update the routing information with the
new sequence number else if the
information arrives with the same
sequence number it looks for the metric
entry and if the number of hops is less than
the previous entry the new information is
updated (if information is same or metric
is more then it will discard the
information).
9. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 101
While the nodes information is being
updated the metric is increased by 1 and
the sequence number is also increased by
1. Similarly, if a new node enters the
network, it will announce itself in the
network and the nodes in the network
update their routing information with a
new entry for the new node.During
broadcasting, the mobile hosts will
transmit their routing tables periodically
but due to the frequent movements by the
hosts in the networks, this will lead to
continuous burst of new routes
transmissions upon every new sequence
number from that destination. The solution
for this is to delay the advertisement of
such routes until it shows up a better
metric.
12. COMPARISON OF DSDV, AODV, DSR
DSDV AODV DSR
1) (DSDV) is a table driven
routing scheme for ad hoc
mobile networks based on the
Bellman-ford algorithm.
1) AODV is an on –Demand
routing protocol which is
confluence of DSDV and
DSR.
1) Dynamic Source
Routing is a Pure On-
Demand routing protocol
2) Each node acts as a router
where a routing table is
maintained and periodic routing
updates are exchange, even if
the routes are not needed.
2) Route is calculated
on demand
2) Route is calculated
only
when it is required.
3) A sequence number is
associated with each route or
path to the destination to
prevent routing loops.
3) AODV provides loop free
routes while repairing link
breakages. but unlike DSDV,
it doesn’t require global
periodic routing
advertisements.
3) It uses no periodic
routing messages like
AODV
4) (DSDV) is a table driven
routing scheme for ad hoc
mobile networks.
4) AODV maintains a routing
table where it maintains one
entry per destination unlike the
DSR that maintains multiple
route cache
4) DSR uses source
routing where the whole
route is carried as an
overhead.
CONCLUSION
In this research paper we have discussed
about a new technology in information
technology: MANET. We have seen the
advancement in this field even day by day
of internet due to wireless networking
technologies. It gives rise to many new
applications that work on wireless
technology. In the past few decades, we
have seen the advancement in wireless
networks. The rising capabilities of mobile
10. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 102
devices are giving a new direction to the
internet, which decreases the cost and
allow us to use infrastructure wireless
networks and infrastructure less wireless
networks that called as MANET (Mobile
Ad hoc Wireless Network). We have also
described the architecture,
characteristics,apploications, advantages
and desadvantages, routing protocols.
There is no doubt that MANET is
development trend for the future.
REFERENCES
[1] Umang Singh, ‘’ Secure Routing
Protocols in mobile Ad hoc networks-A
survey and Taxanomy’’
[2] International Journal of Reviews in
Computing, 30th September 2011, Vol. 7
[3] Qunwei Zheng, Xiaoyan Hong and
Sibabrata Ray,
[4] “Recent Advances in Mobility
Modeling for Mobile Ad hoc Network
Research’’, 2004
[5] B. SOUJANYA, T.
SITAMAHALAXSHMI, CH. DIWAKAR
“ STUDY OF ROUTING PROTOCOLS
IN MOBILE AD HOC NETWORKS”,B.
Soujanya et al./ International Journal of
Engineering Science and
Technology(IJEST), ISSN:0975-5462 Vol.
3, No 4 April 2011.
[6] Kavita Taneja, R.B. Patel “An
Overview of Mobile Ad hoc Networks:
Challenges and Future.”
[7] Vikaram Patalbasi, Sonali Mote
“Mobile Ad hoc Networks: Opportunities
and Future.”
[8] Humayun Bakht “History of Mobile
Ad hoc Networks”
http://www.oocities.org/humayunbakht/H
MANET.pdf
[9] Ram Ramanathan and Jason Redi “A
Brief Overview of Ad Hoc Networks:
Challenges and Directions” IEEE
Communications Magazine- 50th
Anniversary Commemorative Issue/May
2002
[10] Amitabh Mishra and Ketan M.
Nadkarni, Security in Wireless Ad Hoc
Networks, in Book The Handbook of Ad
Hoc Wireless Networks (Chapter 30),
CRC Press LLC, 2003.
[11] . M. Conti, Body, personal, and local
wireless ad hoc networks, in: M. Ilyas
(Ed.), Handbook of Ad Hoc Networks,
CRC Press, New York, 2003 (Chapter 1).
[12] [10] On demand routing in multi hop
wireless mobile Ad hoc networks (chapter
3- Overview of mobile Ad hoc network.
pdf)
[12] [13]Wei-Jie Yu," Pheromone-Distribution-
Based Adaptive Ant Colony System",
GECCO’10, July 7–11, 2010, Portland,
Oregon, USA. ACM 978-1-4503-0072-
8/10/07
[13] [14]Ana Cristina B. Kochem Vendramin,"
CGrAnt: A Swarm Intelligence-based
Routing Protocol for Delay Tolerant
Networks", GECCO’12, July 7–11, 2012,
Philadelphia, Pennsylvania, USA. ACM
978-1-4503-1177-9/12/07
[14] [15]Anuj K. Gupta," Analysis of various
Swarm-based & Ant-based Algorithms",
ACAI '11, July 21 - July 22 2011,
Rajpura/Punjab, India ACM 978-1-4503-
0635-5/11/10
[15] [16]Carlos M. Fernandes," Binary Ant
Algorithm", GECCO’07, July 7–11, 2007,
London, England, United Kingdom. ACM
978-1-59593-697-4/07/0007
[17] Marcelo Portela Sousa," Ant
Colony Optimization with Fuzzy Heuristic
11. International Journal of Engineering and Techniques - Volume 1 Issue 6, Nov – Dec 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 103
InformationDesigned for Cooperative
Wireless Sensor Networks", MSWiM’11,
October 31–November 4, 2011, Miami,
Florida, USA. ACM 978-1-4503-0898-
4/11/10
[18] Rendong Bai," Salvaging Route
Reply for On-Demand Routing Protocols
in Mobile Ad-Hoc Networks",
MSWiM’05, October 10–13, 2005,
Montreal, Quebec, Canada.